throbber
I hereby certify that this paper (along with any paper referred to as being attached
`or enclosed) is being transmitted via the Office electronic filing system in
`accordance with 37 CFR § 1.6(a)(4).
`
`
`
`EgtgfonicASighafuricfb?Matthew H. Grady:
`
`/Matthew H. Grady/
`
`DOCket NO‘: W05(3:70062())
`
`P TENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`In re Patent Application of:
`Kenneth P. Weiss
`
`Application No.: 11/768,729
`
`Confirmation No.: 3536
`
`Filed: June 26, 2007
`
`Art Unit: 2435
`
`
`
`For: UNIVERSAL SECURE REGISTRY Examiner: B. W. Dada
`
`AMENDMENT AFTER FINAL ACTION UNDER 37 C.F.R. 1.116
`
`Commissioner for Patents
`
`Dear Madam:
`
`INTRODUCTORY COMMENTS
`
`In response to the Office Action mailed on December 18, 2012, please amend the above-
`
`identified application as follows: Changes to the claims are shown by strike through (for deleted
`
`matter) and underlining (for added matter).
`
`Amendments to the Claims are reflected in the listing of claims which begins on page 2
`
`of this paper.
`
`Remarks/Arguments begin on page 10 of this paper.
`
`APPLE 1118
`
`APPLE 1118
`
`1 of 13
`
`10f13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`2
`
`Docket No.2 W0537—70062O
`
`AMENDMENTS TO THE CLAIMS
`
`This listing of claims will replace all prior versions, and listings, of claims in the
`application.
`
`Listing of Claims:
`
`1.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time-varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive, from the first party, at least the time-varying
`
`multicharacter code for the entity on whose behalf a transaction is to be performed, configured to
`
`map the time-varying multicharacter code to the identity of the entity in the database using only
`
`the time-varying multicharacter code, to execute a restriction mechanism configured to
`
`determine compliance with any access restrictions for the first party, and to access secure data
`
`associated with the entity including information required to enable the transaction, the
`
`information including account identifying information where the account identifying information
`
`is unknown to the first party, to provide the account identifying information to a third party to
`
`enable the transaction without providing the account identifying information to the first party.
`
`2.
`
`3.
`
`(Canceled)
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is provided to the system via a secure electronic transmission device.
`
`4.
`
`(Previously Presented) The system of claim 1, wherein the time-varying multicharacter
`
`code is encrypted and transmitted to the system, and
`
`wherein the system is configured to decrypt the time-varying multicharacter code with a
`
`public key of the entity.
`
`2 of 13
`
`20f13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`3
`
`Docket No.2 W0537—70062O
`
`5.
`
`(Previously Presented) The system as claimed in claim 1, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein said first party’s service includes delivery,
`
`wherein the information is an address to which an item is to be delivered to the entity,
`
`wherein the system receives the time-varying multicharacter code, and
`
`wherein the system uses the time-varying multicharacter code to obtain the appropriate
`
`address for delivery of the item by the third party.
`
`6.
`
`7.
`
`8.
`
`9.
`
`(Canceled)
`
`(Canceled)
`
`(Canceled)
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes credit card account information regarding the entity, and wherein the
`
`processor is configured to provide the credit card account information based upon the
`
`multicharacter code of the entity to enable the transaction.
`
`10.
`
`(Previously Presented) The system as claimed in claim 9, wherein the system is
`
`configured to receive an approval of the credit card transaction.
`
`11.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information includes bank card account information regarding the entity, and wherein the
`
`processor is configured to provide the bank card account information to enable the transaction
`
`based upon the multicharacter code of the entity.
`
`12.
`
`(Previously Presented) The system as claimed in claim 11, wherein the system is
`
`configured to provide an approval of the bank card transaction.
`
`3 of 13
`
`3of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`4
`
`Docket No.2 W0537—70062O
`
`13.
`
`(Previously Presented) The system as claimed in claim 1, wherein the information
`
`includes personal identification information regarding the entity.
`
`14.
`
`(Previously Presented) The system as claimed in claim 13, wherein the personal
`
`identification information comprises a photograph of the entity, and wherein the photograph is
`
`provided to the first party.
`
`15.
`
`(Previously Presented) The system as claimed in claim 1, wherein the account identifying
`
`information identifies email address information regarding the entity.
`
`16.
`
`(Previously Presented) A method for providing information to a first party to enable
`
`transactions between the first party and entities who have secure data stored in a secure registry
`
`in which each entity is identified by a time-varying multicharacter code, the method comprising:
`
`receiving the time-varying multicharacter code for an entity on whose behalf a
`
`transaction is to take place;
`
`mapping the time-varying multicharacter code to an identity of the entity in a database
`
`using only the time-varying multicharacter code;
`
`determining compliance based on any access restrictions for the first party;
`
`accessing information required to perform the transaction, the information including
`
`account identifying information unknown to the first party;
`
`providing the account identifying information to a third party without providing the
`
`account identifying information to the first party; and
`
`using the account identifying information to enable the first party to perform the
`
`transaction without the first party’s knowledge of the account identifying information.
`
`17.
`
`(Canceled)
`
`18.
`
`(Canceled)
`
`4 of 13
`
`4of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`5
`
`Docket No.2 W0537—70062O
`
`19.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time-
`
`varying multicharacter code comprises receiving the time-varying multicharacter code
`
`transmitted via a secure electronic transmission device.
`
`20.
`
`(Previously Presented) The method of claim 16, wherein the act of receiving the time-
`
`varying multicharacter code comprises receiving an encrypted multicharacter code, and
`
`wherein the method further comprises decrypting the encrypted multicharacter code.
`
`21.
`
`(Previously Presented) The method as claimed in claim 16, wherein the transaction
`
`includes a service provided by the first party,
`
`wherein the service includes delivery,
`
`wherein the account identifying information is associated with an address to which an
`
`item is to be delivered for the entity, and
`
`wherein the third party receives the address for delivery of an item provided by the first
`
`party.
`
`22.
`
`(Canceled)
`
`23.
`
`(Canceled)
`
`24.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information includes a credit card number, and wherein the act of using the account
`
`identifying information comprises using the credit card number to enable the transaction.
`
`25.
`
`(Previously Presented) The method as claimed in claim 24, wherein the act of using the
`
`account identifying information comprises receiving a validation or denial of the transaction
`
`without providing the credit card number of the entity to the first party.
`
`26.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of using the
`
`account identifying information comprises using bank card information about the entity to
`
`enable a transaction.
`
`5 of 13
`
`50f13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`6
`
`Docket No.2 W0537—70062O
`
`27.
`
`(Previously Presented) The method as claimed in claim 26, wherein the act of using the
`
`information comprises receiving a validation or denial of the bank card transaction without
`
`providing a bank card number of the entity to the first party.
`
`28.
`
`(Previously Presented) The method as claimed in claim 16, wherein the act of mapping
`
`the time-varying multicharacter code to information required by the first party comprises
`
`mapping the time-varying multicharacter code to personal identification information about the
`
`entity.
`
`29.
`
`(Previously Presented) The method as claimed in claim 28, wherein the personal
`
`identification information comprises a photograph of the entity, and
`
`wherein the method further comprises an act of providing the photograph to the first
`
`party.
`
`30.
`
`(Previously Presented) The method as claimed in claim 16, wherein the account
`
`identifying information identifies email address information about the entity.
`
`31.
`
`(Canceled).
`
`32.
`
`(Previously Presented) The method as claimed in claim 24, further comprising an act of
`
`transmitting to the first party one of an approval or a denial of the credit card transaction.
`
`33.
`
`(Previously Presented) The system of claim 1, wherein the database is further configured
`
`to associate biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`34.
`
`(Previously Presented) The system of claim 33, wherein the processor is further
`
`configured to map the time-varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed and to provide the biometric
`
`information to the first party.
`
`6 of 13
`
`6of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`7
`
`Docket No.2 W0537—70062O
`
`35.
`
`(Previously Presented) The system of claim 34, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`36.
`
`(Previously Presented) The system of claim 34, wherein the time-varying multicharacter
`
`code is generated by a device associated with the entity on whose behalf the transaction is to be
`
`performed.
`
`37.
`
`(Previously Presented) The method as claimed in claim 16, further comprising an act of
`
`associating biometric information with each entity having secure data in the secure registry,
`
`respectively.
`
`38.
`
`(Previously Presented) The method of claim 37, further comprising acts of:
`
`mapping the time-varying multicharacter code to biometric information associated with
`
`the entity on whose behalf the transaction is to be performed; and
`
`providing the biometric information to the first party.
`
`39.
`
`(Previously Presented) The method of claim 38, wherein the biometric information
`
`includes an image of the entity on whose behalf the transaction is to be performed.
`
`40.
`
`(Canceled).
`
`41.
`
`(Previously Presented) The system of claim 1, wherein the account identifying
`
`information includes an account number.
`
`42.
`
`(Previously Presented) The system of claim 41, wherein the account identifying
`
`information includes credit card account information and the account number includes a credit
`
`card number.
`
`7 of 13
`
`7of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`8
`
`Docket No.2 W0537—70062O
`
`43.
`
`(Previously Presented) The system of claim 41, wherein the third party includes a
`
`financial service provider and the account number includes at least one of a debit card number
`
`and a credit card number.
`
`44.
`
`(Currently Amended) The system of claim 43, wherein the first party includes a
`
`merchant, and the service includes a sale of at least one of goods and services.
`
`45.
`
`(Previously Presented) The system of claim 44, wherein the processor is further
`
`configured to receive, from the first party, a merchant ID, and a purchase amount.
`
`46.
`
`(Previously Presented) The system of claim 1, wherein the identity of the entity is
`
`unknown until the time-varying code is mapped to the identity by the processor.
`
`47.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time-varying multicharacter code representing an identity of one of
`
`the respective entities, wherein the database is configured to permit or deny access to
`
`information on the respective entity using the time-varying multicharacter code; and
`
`a processor configured to receive, the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity to identify the entity, configured to execute a
`
`restriction mechanism configured to determine compliance with any access restrictions for the
`
`first party, configured to obtain from the database the secure data associated with the entity
`
`including information required to enable the transaction, the information including account
`
`identifying information, and configured to provide the account identifying information to a third
`
`party to enable the transaction without providing the account identifying information to the first
`
`party.
`
`8 of 13
`
`80f13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`9
`
`Docket No.2 W0537—70062O
`
`48.
`
`(Currently Amended) A secure registry system for providing information to a first party
`
`to enable transactions between the first party and entities with secure data stored in the secure
`
`registry system, the secure registry system comprising:
`
`a database including secure data for each entity, wherein each entity is associated with a
`
`time-varying multicharacter code for each entity having secure data in the secure registry
`
`system, respectively, each time-varying multicharacter code representing an identity of one of
`
`the respective entities; and
`
`a processor configured to receive the time-varying multicharacter code for the entity on
`
`whose behalf a transaction is to be performed, configured to map the time-varying
`
`multicharacter code to the identity of the entity without requiring further information to identify
`
`the entity, configured to access from the database secure data associated with the entity
`
`including information required to enable the transaction, the information including account
`
`identifying information, and configured to provide the account identifying information to a third
`
`party to enable the transaction without providing the account identifying information to the first
`
`party, and wherein enabling the transaction without providing account identifying information to
`
`the first party includes limiting the account identifying information provided by the secure
`
`registry system to the first party to transaction approval information.
`
`9 of 13
`
`9of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`10
`
`Docket No.2 W0537—700620
`
`REMARKS
`
`Claims 1, 3-5, 9-16, 19-21, 24-30, 32-39 and 41-48 were previously pending in this
`
`application. Claims 1, 16, 44, 47 and 48 have been amended. As a result claims 1, 3-5, 9-16,
`
`19-21, 24-30, 32-39 and 41-48 are pending for examination with claims 1, 16, 47 and 48 being
`
`independent claims. No new matter has been added.
`
`Examiner Interview
`
`Applicant wishes to thank Examiner Dada for the courtesies extended to Applicant’s
`
`Representative during the course of the Interview conducted on April 9, 2013. During the
`
`course of the Interview, the participants discussed the Application, Office Action, the rejections
`
`of record and proposed amendments. In particular, Applicant proposed amendment to claim 1.
`
`Claim 1, as amended, now recites “a restriction mechanism configured to determine compliance
`
`with any access restrictions for the first party,” which is not taught or suggested by Giordano or
`
`Weiss. Although agreement as to the allowability of the claims was not reached, Examiner Dada
`
`agreed that the proposed amendments would overcome the present rejection. Accordingly,
`
`presented are the amendments to the claims discussed. Favorable consideration is respectfully
`
`requested.
`
`Re'ections Under 35 U.S.C.
`
`103
`
`The Office Action rejected claims 1, 3-5, 9-16, 19-21, 24-30, 32-39 and 41-48 under 35
`
`U.S.C. §103(a) as being unpatentable over US. Patent No. 7,571,139 B1 to Gioradano et al.
`
`(hereinafter Gioradano) in view of US. Patent No. 5,657,388 to Weiss (hereinafter Weiss). In
`
`response, Applicant has amended claims 1, 16, 47 and 48 and submits the following remarks.
`
`Applicant respectfully asserts that the claim 1, as amended, is patentable in view of the
`
`alleged combination at least because Giordano and Weiss alone or in proper combination do not
`
`teach or suggest “a restriction mechanism configured to determine compliance with any access
`
`restrictions for the first party,” as recited in claim 1, as amended.
`
`Giordano is directed to “a network for processing retail sales transactions” including “a
`
`customer transceiver with a unique customer number” (Abstract). Giordano teaches a
`
`“transaction processing system” that processes transactions with the “appropriate payment
`
`processing center” based on received authorization requests including “the customer ID,
`
`merchant ID and transaction data” (Col. 3 Lines 29-36). In summary, Giordano teaches the use
`
`10 of 13
`
`10 of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`11
`
`Docket No.2 W0537—70062O
`
`of a customer transceiver to authorize a transaction processing system to carry out a monetary
`
`transaction between a customer and a merchant at the appropriate payment processing center.
`
`Giordano does not teach or suggest “a restriction mechanism configured to determine
`
`compliance with any access restrictions for the first party,” as recited in claim 1, as amended.
`
`Rather, Giordano teaches the use of a customer transceiver to authorize a transaction processing
`
`system to carry out a monetary transaction between a customer and a merchant at the appropriate
`
`payment processing center. Accordingly, claim 1, as amended, distinguishes over the Giordano
`
`reference.
`
`Weiss is directed to “a method and apparatus for utilizing a token” to “provide secure
`
`access by authorized users to a selected resource” (Abstract). Weiss teaches the generation and
`
`use of a one-time variable multi-character code based in part on information stored in the token
`
`to authenticate the user’s identity. Weiss does not teach or suggest “a restriction mechanism
`
`configured to determine compliance with any access restrictions for the first party,” as recited in
`
`claim 1, as amended. Rather, Weiss teaches the use of a one-time variable multi-character code
`
`based in part on information stored in a user’s token to authenticate a user. Accordingly, claim
`
`1, as amended, distinguishes over the Weiss reference.
`
`As neither Giordano nor Weiss teach or suggest this element, the combination, even if
`
`assumed proper, does not teach or suggest claim 1. Claims 3-5, 9-15, 33-36 and 41-46 depend
`
`from claim 1 and are allowable for at least the same reasons. Accordingly, withdrawal of the
`
`rejection of claims 1, 3-5, 9-15, 33-36 and 41-46 under 35 U.S.C. §103(a) is respectfully
`
`requested.
`
`Independent Claim 16
`
`Independent claim 16, as amended, recites “determining compliance based on any access
`
`restrictions for the first party.” As discussed above with respect to claim 1, Giordano teaches the
`
`use of a customer transceiver to authorize a transaction processing system to carry out a
`
`monetary transaction between a customer and a merchant at the appropriate payment processing
`
`center. Thus, Giordano does teach or suggest “determining compliance based on any access
`
`restrictions for the first party,” as recited in claim 16, as amended. Assuming the combination is
`
`proper, the addition of Weiss does not cure this deficiency as Weiss does not teach or suggest
`
`“determining compliance based on any access restrictions for the first party,” as recited in claim
`
`11 of 13
`
`11 of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`12
`
`Docket No.2 W0537—70062O
`
`16, as amended. Claims 19-21, 24-30, 32 and 37-39 depend from claim 16 and are allowable for
`
`at least the same reasons. Accordingly, withdrawal of the rejection of claims 16, 19-21, 24-30,
`
`32 and 37-39 under 35 U.S.C. §103(a) is respectfully requested.
`
`Independent Claim 47
`
`Independent claim 47 is also patentable in view of the alleged combination at least
`
`because Giordano and Weiss alone or in proper combination do not teach or suggest “a
`
`restriction mechanism configured to determine compliance with any access restrictions for the
`
`first party,” as recited in claim 47, as amended. As discussed above with respect to claim 1,
`
`Giordano teaches the use of a customer transceiver to authorize a transaction processing system
`
`to carry out a monetary transaction between a customer and a merchant at the appropriate
`
`payment processing center. The addition of Weiss does not cure this deficiency. Accordingly,
`
`withdrawal of the rejection of claim 47 under 35 U.S.C. §103(a) is respectfully requested.
`
`Independent Claim 48
`
`Independent claim 48, as amended, is patentable in view of the alleged combination at
`
`least because Giordano and Weiss alone or in proper combination do not teach or suggest
`
`“wherein enabling the transaction without providing account identifying information to the first
`
`party includes limiting the account identifying information provided by the secure registry
`
`system to the first party to transaction approval information,” as recited claim 48, as amended.
`
`Giordano teaches the “transaction processing system” transmitting to the online merchant
`
`“identification information and other data unique to the associated customer in the absence of a
`
`retail transaction” (See Col. 4 Lines 17-21). Giordano explicitly teaches the transmission of
`
`information regarding the user (e. g., entity or purchaser), including loyalty program information
`
`(See e.g., Col. 4 Lines 54-58), to a merchant (e. g., first party) rather than limiting the
`
`information transmitted to the merchant to transaction approval information. Accordingly,
`
`Giordano does not teach or suggest claim 48, as amended. Assuming the combination is proper,
`
`the addition of Weiss does not cure this deficiency. Weiss teaches the use of a one-time variable
`
`multi-character code based in part on information stored in a user’s token to authenticate a user.
`
`Thus, Weiss does not teach “wherein enabling the transaction without providing account
`
`identifying information to the first party includes limiting the account identifying information
`
`12 of 13
`
`12 of13
`
`

`

`Application No. 11/768,729
`Amendment dated April 12, 2013
`After Final Office Action of December 18, 2012
`
`13
`
`Docket No.2 W0537—700620
`
`provided by the secure registry system to the first party to transaction approval information,” as
`
`recited in claim 48, as amended. Accordingly, withdrawal of the rejection of claim 48 under 35
`
`U.S.C. §103(a) is respectfully requested.
`
`CONCLUSION
`
`In view of the foregoing amendments and remarks, reconsideration is respectfully
`
`requested. This application should now be in condition for allowance; a notice to this effect is
`
`respectfully requested. If the Examiner believes, after this amendment, that the application is
`
`not in condition for allowance, the Examiner is requested to call the Applicant's attorney at the
`
`telephone number listed below.
`
`If this response is not considered timely filed and if a request for an extension of time is
`
`otherwise absent, Applicant hereby requests any necessary extension of time. If there is a fee
`
`occasioned by this response, including an extension fee that is not covered by an accompanying
`
`payment, please charge any deficiency to Deposit Account No. 50/2762 (W0537-700620).
`
`Dated: April 12, 2013
`
`Respectfully submitted,
`
`/Matthew H. Grady/
`
`Electronic signature:
`Matthew H. Grady
`Registration No.: 52,957
`John N. Anastasi
`
`Registration No.: 37,765
`
`LANDO & ANASTASI LLP
`
`Riverfront Office Park
`One Main Street
`Suite 1100
`
`Cambridge, Massachusetts 02142
`(617) 395-7000
`
`Attorney for Applicant
`
`13 of 13
`
`13 of13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket